My Research


A large number of cyber-physical robotic systems (CPRS), such as unmanned aircraft systems, smart power grids, industrial robots, intelligent robotic systems, autonomous vehicles, transportation networks, air traffic systems and supply chains, are characterized as collections of interacting subsystems with ambiguous or unknown models, and are acted upon by multiple decision makers with hard-to-model and heterogeneous intentions and behaviors (malicious, competitive, cooperative, stubborn). Such large-scale systems are present in all societal sectors, from critical infrastructure, manufacturing and agriculture to service sectors.

Motivated by this, my goal is to design distributed, tractable, robust, safe and private sequential decision-making algorithms in multi-modal and switched cyber-physical systems that are compromised by adversarial or malicious agents, and are subject to various forms of real-world uncertainties. To accomplish this objective, I will leverage model-based control-theoretic, as well as data-driven learning approaches to develop tractable and computationally efficient algorithms for reachability analysis, state and model estimation, attack identification and mitigation, verification and control synthesis in (partially) unknown networked cyber-physical systems. 

1. Safety Verification, Invariance Properties & Guaranteed Learning of Hybrid Autonomous Systems.

The interaction between physical dynamics and discrete switching logic in engineering applications, such as automotive safety verification or terrain estimation for planetary rovers [1], can lead to unexpected system behaviors or even catastrophic failures, making overall system analysis and safety verification extremely challenging. Therefore, to ensure safety and meet specific performance requirements, these couplings must be properly incorporated into the system's mathematical representation, requiring the use of both discrete and continuous states, known as a hybrid system model, for which I plan to address secure estimation and learning as follows.

state and terrain estimation of  a planetary  rover [1]

1.1. Constrained Reachability & Set-Valued State Estimation of Uncertain Systems.

I leverage system properties such as mixed-monotonicity to propose a novel class of bounding functions, i.e, Remainder-Form Decomposition Functions, that can be tractably computed. This enables us to obtain tight reachable sets (tubes) of state trajectories of a very broad class of non-smooth and discontinuous nonlinear systems subject to state constraints, observations and set-valued uncertainties [2], and facilitates designing efficient set-inversion algorithms [2, 3]. This has resulted in several set-valued stable (and optimal) observer designs for different uncertainty set characterizations, such as intervals [4, 5, 6], hyperballs [7], and polytopes [3, 8].

set-valued state estimation of a unicycle robot [8]

1.2 Controlled Invariance & Safety Verification of Hybrid Autonomous Systems.

I design algorithms that can effectively propagate uncertainty sets of states and disturbances through nonlinear hybrid dynamics and identify subsets of propagated sets that are compatible with nonlinear system measurements, using tractable methods. Additionally, leveraging theoretical tools such as decomposition functions [2], abstraction techniques [9], and graph-theoretic methods, I aim to deploy the designed reachability analysis and state estimation framework [8, 3, 10] in distributed settings, including multi-agent systems, event-triggered, multi-modal, switched, and hybrid distributed plants. Moreover, I intend to use set-theoretic methods to develop tractable algorithms for computing robust reach-avoid-maintain and invariant sets [11] in hybrid networked systems, which have numerous applications, such as safe optimal control and path planning in autonomous vehicles and robotic systems.


Robust reachability-based safety verification 

1.3 Secure Estimation of Unknown CPRS: Set-Membership Learning Meets State Estimation.  

I address the situation where, on top of external uncertainties and distur- bances, our understanding of the system’s model or dynamics is incomplete or imprecise. This can be due to various factors, such as the disparate nature of sensors in a vehicle, errors in the model, unpredictable environments, or adversarial inputs. To handle this challenge, I intend to combine the model-based estimation techniques I have previously developed [13, 14, 15] with set-membership learning methods [9, 12]. The goal is to acquire a guaran- teed approximation of the system dynamics while simultaneously estimating the system states and the adversary’s strategies [1, 16, 17] to make robust and (sub)optimal decisions. This enables designing secure and safe estima- tion, path planning, and control algorithms for complex uncertain CPRS.  

Set-membership learning [12]

2. Resilient & Strategic Decision-Making in Uncertain Adversarial Autonomous Systems. 

Although cyber-physical coupling introduces new functions and improves the performance of control systems, it also exposes them to new cyber vulnerabilities. When safety-critical systems are compromised or malfunction, they can cause significant harm to operators, users, and the physical components being controlled. For example, accurately estimating the intentions of heterogeneous drivers has become crucially important for safe autonomous driving to avoid catastrophic accidents. Therefore, incidents involving adversaries, such as a malicious driver’s unpredictable actions, have accentuated the need for CPRS security and the development of new designs for resilient estimation, attack mitigation, and control. So, addressing resilient decision-making in uncertain CPRS that are compromised by adversarial agents or unexpected events, such as autonomous intelligent vehicle systems facing drivers with different intentions or smart grids under attacks, is both challenging and valuable. My research aims to tackle this challenge by integrating set-theoretic approaches and robust decision-making frameworks with advanced machine learning techniques as follows.

Intention estimation for autonomous vehicles

2.1 Simultaneous Input and State Set-Valued Observer Design for Several Classes of Nonlinear Systems.

I design tractable (distributed) algorithms to simultaneously estimate states and unknown inputs/attacks in several classes of nonlinear CPRS [15], assuming that the adversaries and uncertainties impact the system in the worst-case scenario, and no useful a priori knowledge, bound or distribution of the attack signals, nor any statistical characteristics for noise and disturbance signals are available. Further, I am leveraging the knowledge of physical system dynamics as an additional sensor to improve the estimates, which equips me with proper tools to develop attack identification approaches and to efficiently synthesize centralized and distributed control strategies to mitigate the e ects of attacks in such settings [18, 19, 20, 21, 14].

Resilient estimation s.t. different uncertainty models [18]

2.2. Multiple-Model: i) Bank of Mode-Matched Observers, ii) Mode Estimator, iii) Global Fusion.

In many switched or hybrid safety-critical CPRS, e.g., networked autonomous vehicle systems and smart grids, modes (such as discrete states, sensor modalities, or types of outliers) can be compromised through switching attacks by adversaries or outliers, in addition to data injection attacks. However, existing outlier detection/mode estimation approaches in such settings rely on restrictive adversarial assumptions. To address this issue, my aim is to develop a multiple-model (MM) framework [18, 19] that includes i) a bank of mode-matched observers that provide input and state estimates for the given mode, ii) a mode estimator that deter- mines the most likely or all compatible modes based on observations, and iii) a global fusion estimator that combines the estimates from the bank of estimators and mode observer. The MM framework offers unified algorithms for resilient state estimation, attack mitigation, and control strategies in the presence of different types of uncertainty models, including stochastic (aleatoric), set-valued (epistemic), combined, distributionally robust uncertainties, as well as random set models.

Multiple-model framework

2.3. Resilient and Strategic Decision-Making in Networked CPRS with Heterogeneous Agents: Robust Dynamic Networked Games.

I am working on designing distributed active estimation, fault detection, and control policies for uncertain networked cyber-physical systems. Specifically, I will explore human-robot coordina- tion/competition scenarios in networked systems, such as autonomous vehicles, and investigate game-theoretic techniques to model the strategic behavior of the agents. Instead of only considering the best worst-case scenario, I plan to incorporate strategic decision-making that takes into account robust control and intention estimation approaches for addressing resiliency in the face of uncertainties. To achieve this, I will develop computationally efficient network communication protocols and apply them in the context of robust dynamic/differential networked games. In this context, agents with different intentions, types, and beliefs will adaptively improve their approximation of other agents’ private objective functions by applying set-membership learning techniques [9, 12]. They will then optimize their own objective functions by making decisions based on different levels of bounded rationality, subject to state dynamics and safety constraints. The ultimate goal is to design a system that can handle uncertain networked CPRS with multiple agents while ensuring safety and resiliency.

Resilient reinforcement learning for multi-agent cooperative control

3. Guaranteed Privacy-Preserving Optimization, Estimation, Verification and Control in Adversarial CPRS: Robust Deterministic Set-Valued Functional Perturbations. 

Motivated by the need to protect sensitive information in networked CPRS, such as in private ride-sharing or verification problem in autonomous vehicles, or control of privacy-sensitive energy settings, a considerable amount of research has focused on ensuring data privacy. However, existing approaches like differential privacy either sacrifice accuracy or incur high computation or communication overhead. I aim to address this challenge as follows. 

3.1. Alternative Designs of Privacy-Preserving Mechanisms. 

I am investigating alternative designs of privacy-preserving mechanisms, which can make the quantification of privacy and the associated performance loss tractable and reasonable, respectively. Next, utilizing such alternative designs, my objective is to propose tractable and private estimation, verification, control and resource allocation algorithms in networked CPRS. I am leveraging a robust optimization approach to propose a functional perturbation-based privacy-preserving mechanism for non-convex distributed optimization, as well as to characterize the best accuracy that can be achieved by an optimal perturbation [22].

Privacy-preserving functional perturbation: a) true, b) perturbed objective

3.2. Guaranteed Privacy-Preserving Mechanism Design: Deterministic Set-Valued Perturbations

I plan to adapt my previously developed robust set-membership analysis tools [2, 17] to introduce the new notion of guaranteed privacy. As opposed to differential privacy, where, to preserve the privacy of agents or data, the exchanged messages or functions are compromised by stochastic perturbations, in guaranteed privacy-preserving mechanism design [21] the main idea is to perturb the true variables or functions by deterministic but uncertain perturbations in a distributed manner, such that the privacy is preserved, regardless of the utilized optimization, estimation, verification or control algorithm. The introduction of such set-valued perturbations enables the attainment of a quantifiable accuracy via a theoretical upper bound that will be shown to be independent of the chosen algorithms. This will result in designing guaranteed privacy-preserving mechanisms that are optimal in the sense that they minimize the corresponding inaccuracy of the networked CPRS performance due to the perturbations. Furthermore, the designed mechanisms are robust against uncertainties in environment and models, and are resilient against changes in the adversary’s intention and knowledge of the system/setting.

3.3. CPRS Under Attack: Guaranteed Privacy Meets Resilience.

In many complex large-scale CPRS, such as swarm robotics, autonomous vehicles and smart grids, the presence of both malicious agents executing false data injection attacks or unexpected behaviors, together with adversarial eavesdropping agents aiming to extract valuable information, is a legitimate concern. In response to this challenge, I plan to develop model predictive control (MPC) strategies that not only ensure privacy but also demonstrate resilience against false data attacks. The main idea is to deploy set- theoretic methods [2, 5, 14, 18], as well as a guaranteed privacy-preserving mechanism design approach [23], to design resilient and privacy-assured observers that yield secure set-valued state estimates, along with robust predictions of the CPRS trajectory. This will culminate in the synthesis of robust, distributed, resilient, and guaranteed privacy-preserving MPC strategies. Such framework could be extended further to guaranteed-private and resilient strategic decision-making, by deploying robust dynamic games (cf. 2.3). 

guaranteed privacy-preserving adaptive cruise control

GP-resileient model predictive control of  a MAS under-attack

References


[1] M. Khajenejad, Z. Jin, and S.Z. Yong. Set-valued state and unknown terrain estimation for planetary rovers. Advanced Intelligent Systems, 2021.

[2]  M. Khajenejad and S.Z. Yong. Tight remainder-form decomposition functions with applications to constrained reachability and guaranteed state estimation. in IEEE Transaction on Automatic Control, accepted, 2023.

[3] M. Khajenejad, F. Shoaib, and S.Z. Yong. Guaranteed state estimation via indirect polytopic set computation for nonlinear discrete-time systems. In 60th IEEE Conference on Decision and Control (CDC), pages 6160–6167, 2021.

[4] M. Khajenejad, F. Shoaib, and S.Z. Yong. Interval observer synthesis for locally lipschitz nonlinear dynamical systems via mixed-monotone decompositions. In 2022 American Control Conference (ACC), pages 2970–2975. IEEE, 2022.

[5]  M. Khajenejad and S. Z. Yong. H-optimal interval observer synthesis for uncertain nonlinear dynamical systems via mixed-
monotone decompositions. IEEE Control Systems Letters, 6:3088–3013, 2022.

[6]  T. Pati, M. Khajenejad, S.P. Daddala, and S.Z. Yong. L1-robust interval observer design for uncertain nonlinear dynamical systems. IEEE Control Systems Letters, 6:3475–3480, 2022.

[7]  M. Khajenejad and S.Z. Yong. Simultaneous input and state set-valued H-observers for linear parameter-varying systems. In American Control Conference (ACC), pages 4521–4526, 2019.

[8] M. Khajenejad, F. Shoaib, and S. Z. Yong. Guaranteed state estimation via direct polytopic set computation for nonlinear discrete-time systems. IEEE Control Systems Letters, 6:2060–2065, 2021.

[9]  S.M. Hassaan, M. Khajenejad, S. Jensen, Q. Shen, and S.Z. Yong. Incremental affine abstraction of nonlinear systems. IEEE Control Systems Letters, 5(2):653–658, 2020.

[10] M. Khajenejad and S.Z. Yong. Simultaneous input and state interval observers for nonlinear systems with full-rank direct feedthrough. In 59th IEEE Conference on Decision and Control (CDC), pages 5443–5448, 2020.

[11] S. Brown, M. Khajenejad, S.Z. Yong, and S. Martinez. Computing controlled invariant sets of nonlinear control-affine systems. In 62nd Conference on Decision and Control (CDC), accepted, arXiv preprint arXiv:2304.11757. IEEE, 2023.

[12] Z. Jin, M. Khajenejad, and S.Z. Yong. Data-driven model invalidation for unknown Lipschitz continuous systems via abstraction. In American Control Conference (ACC), pages 2975–2980. IEEE, 2020.

[13] M. Khajenejad and S.Z. Yong. Simultaneous input and state interval observers for nonlinear systems with rank-deficient direct feedthrough. In IEEE European Control Conference (ECC), pages 2848–2854, 2021.

[14] M. Khajenejad, S. Brown, and S. Martinez. Distributed resilient interval observers for bounded-error LTI systems subject to false data injection attacks. In American Control Conference (ACC), pages 3502–3507. IEEE, 2023.

[15] M. Khajenejad and S.Z. Yong. Simultaneous state and unknown input set-valued observers for quadratically constrained nonlinear dynamical systems. International Journal of Robust and Nonlinear Control, 32:6589–6622, 2022.

[16] M. Khajenejad, Z. Jin, and S.Z. Yong. Interval observers for simultaneous state and model estimation of partially known nonlinear systems. In 2021 American Control Conference (ACC), pages 2848–2854. IEEE, 2021.

[17] M. Khajenejad, Z. Jin, and S.Z. Yong. Resilient interval observer for simultaneous estimation of states, modes and attack policies. In 2022 American Control Conference (ACC), pages 322–329. IEEE, 2022.

[18] M. Khajenejad and S.Z. Yong. Resilient state estimation and attack mitigation in cyber-physical systems. In Security and Resilience in Cyber-Physical Systems: Detection, Estimation and Control, pages 149–185. Springer, 2022.

[19] M.Khajenejad and S.Z.Yong. Simultaneous mode, input and state set-valued observers with applications to resilient estimation against sparse attacks. In 58th IEEE Conference on Decision and Control (CDC), pages 1544–1550, 2019.

[20] M.Khajenejad and S.Z.Yong. Simultaneous mode, state and input set-valued observers for multi-modal and switched nonlinear systems. arXiv preprint arXiv:2102.10793, submitted, 2022.

[21]  M. Khajenejad, S. Brown, and S. Martinez. Distributed interval observers for bounded-error LTI systems. In American Control Conference (ACC), pages 2444–2449. IEEE, 2023.

[22] M. Khajenejad and S. Martinez. Guaranteed privacy of distributed nonconvex optimization via mixed-monotone functional perturbations. IEEE Control Systems Letters, 7:1081–1086, 2023.

[23]  M. Khajenejad and S. Martinez. Guaranteed privacy-preserving H-optimal interval observer design for bounded-error LTI systems. IEEE, 2023, under review.